Language Selection

English French German Italian Portuguese Spanish

Linux

How to install and configure Gufw on Linux Deepin 11.12.1

Filed under
Linux

A new installation of Linux Deepin 11.12.1 does not have any of the network security applications that you find on Ubuntu enabled: A default installation of Linux Deepin 11.12.1, the latest edition, will leave your computer wide open for the bad guys to mess with.

Linux Deepin 11.12.1 review

Filed under
Linux

Linux Deepin is a desktop distribution based on Ubuntu Desktop, but using a modifed GNOME 3 shell, not Ubuntu’s Unity desktop. It was founded by Liu Wenhuan, who is also a co-founder of Wuhan Linux User Group (LUG), a LUG in Wuhan, the capital of Hubei province, China.

SalineOS 1.6 review

Filed under
Linux

SalineOS is a desktop Linux distribution based on Debian and uses the Xfce desktop environment. The first version reviewed on this website was SalineOS 1.1, and that was back in February 2011 . There has been several versions published since then – SalineOS 1.2, 1.3, 1.4 and 1.5. This article is a review of the latest version, SalineOS 1.6, which was released on February 1 2011.

Linux Deepin 11.12.1 screen shots

Filed under
Linux

Though I tend to stay away from publicly reviewing distributions that use the default GNOME 3 desktop, I evaluate them privately and if I come across one that has been modified to look like a true desktop operating system, then I will take the time to do what it takes to publish a review on it. Linux Deepin falls into that category. So expect a review of Linux Deepin soon.

Kubuntu 12.04 Precise Pangolin beta 1 screen shots

Filed under
Linux

Yet another screen shot post on yet another pre-stable release distribution. This time, it is from Kubuntu 12.04 beta 1, the first beta release of what will become Kubuntu 12.04 LTS (Long Term Support).

Ubuntu 12.04 Precise Pangolin beta 1 screen shots

Filed under
Linux

The first beta version of what will become Ubuntu 12.04, Precise Pangolin, has just been released. The final, stable version will be released by the end of April. This beta release, as with all pre-stable distribution releases, is an invitation for bug hunters to get busy.

Top 10 enterprise-grade features to expect in Fedora 17

Filed under
Linux

This article lists the top ten features that will appeal primarily to enterprise users. Keep in mind that most of them have not been fully implemented in Fedora 17 alpha, the first public release of what would become Fedora 17.

The features in alphabetical order, are:

Read the complete article at http://www.linuxbsdos.com/2012/03/01/top-10-enterprise-grade-features-to-expect-in-fedora-17/

Top features for desktop users of Fedora 17

Filed under
Linux

Like previous editions of Fedora, Fedora 17 will ship with several major feature enhancements. Some will be of interest only to enterprise users, while others will be mainly for desktop users. Other features will, of course, appeal to the needs of both enterprise and desktop users.

Ubuntu 11.10 as an alternative to OSX on the Macbook Pro

Filed under
Linux

For those users not enamoured by the direction OSX is taking or if you are looking to run a free Opensource alternative there are a couple of choices in the Linux camp. I've covered Sabayon and in this article I take a look at just how easy is it to install Ubuntu on a Macbook Pro as the Only OS.

Read More

A week with Sabayon on the Macbook Pro

Filed under
Linux

Last week after being desperatly disappointed with the direction Apple are taking with OSX after using Mountain Lion for a ew hour i decided to go back to using Linux. However finding the right Linux distro was important, the Macbook Pro (MBP) is not a PC, yes it will run almost every Intel based linux distro there are a few hardware gotchas which make the choice of Distro important for the quickest out of the box up and working experience.

As the title suggests a platform i'm already enamoured with was my first choice, the Gentoo based source and binary distro Sabayon with its recently updated version 8.

Read More

Syndicate content

More in Tux Machines

today's leftovers

Leftovers: OSS and Sharing

Security Leftovers

  • Chrome vulnerability lets attackers steal movies from streaming services
    A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion University of the Negev Cyber Security Research Center (CSRC) in collaboration with a security researcher from Telekom Innovation Laboratories in Berlin, Germany.
  • Large botnet of CCTV devices knock the snot out of jewelry website
    Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices. The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.
  • Study finds Password Misuse in Hospitals a Steaming Hot Mess
    Hospitals are pretty hygienic places – except when it comes to passwords, it seems. That’s the conclusion of a recent study by researchers at Dartmouth College, the University of Pennsylvania and USC, which found that efforts to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff. The report describes what can only be described as wholesale abandonment of security best practices at hospitals and other clinical environments – with the bad behavior being driven by necessity rather than malice.
  • Why are hackers increasingly targeting the healthcare industry?
    Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft. This personal data often contains information regarding a patient’s medical history, which could be used in targeted spear-phishing attacks.
  • Making the internet more secure
  • Beyond Monocultures
  • Dodging Raindrops Escaping the Public Cloud